ARPSyndicate - Cyber & Open Source Intelligence
463 subscribers
31 photos
1 video
1 file
4.61K links
A Global Cyber Intelligence Company with hyperspecialization in Information Discovery, Shadow IT & Vulnerability Intelligence.

A.R.P. Syndicate [https://arpsyndicate.io/pricing.html]
Download Telegram
#ExploitObserverAlert

CVE-2024-25288

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25288. SLIMS (Senayan Library Management Systems) 9 Bulian v9.6.1 is vulnerable to SQL Injection via pop-scope-vocabolary.php.
#ExploitObserverAlert

CVE-2023-24334

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-24334. A stack overflow vulnerability in Tenda AC23 with firmware version US_AC23V1.0re_V16.03.07.45_cn_TDC01 allows attackers to run arbitrary commands via schedStartTime parameter.
#ExploitObserverAlert

CVE-2024-20325

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-20325. A vulnerability in the Live Data server of Cisco Unified Intelligence Center could allow an unauthenticated, local attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control implementations on cluster configuration CLI requests. An attacker could exploit this vulnerability by sending a cluster configuration CLI request to specific directories on an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
#ExploitObserverAlert

CVE-2023-47795

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-47795. Stored cross-site scripting (XSS) vulnerability in the Document and Media widget in Liferay Portal 7.4.3.18 through 7.4.3.101, and Liferay DXP 2023.Q3 before patch 6, and 7.4 update 18 through 92 allows remote authenticated users to inject arbitrary web script or HTML via a crafted payload injected into a document's “Title” text field.
#ExploitObserverAlert

CVE-2023-6533

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-6533. Malformed Device Reset Locally Command Class packets can be sent to the controller, causing the controller to assume the end device has left the network. After this, frames sent by the end device will not be acknowledged by the controller. This vulnerability exists in PC Controller v5.54.0, and earlier.
#ExploitObserverAlert

CVE-2024-24478

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-24478. An issue in Wireshark team Wireshark before v.4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components.
#ExploitObserverAlert

CVE-2024-1714

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1714. Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
#ExploitObserverAlert

CVE-2023-52154

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-52154. File Upload vulnerability in pmb/camera_upload.php in PMB 7.4.7 and earlier allows attackers to run arbitrary code via upload of crafted PHTML files.
#ExploitObserverAlert

CVE-2023-38844

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-38844. SQL injection vulnerability in PMB v.7.4.7 and earlier allows a remote attacker to execute arbitrary code via the thesaurus parameter in export_skos.php.
#ExploitObserverAlert

GHSA-73x3-8mrg-5r93

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-73x3-8mrg-5r93. Liferay Portal Language Override edit screen and Liferay DXP vulnerable to reflected Cross-site Scripting
#ExploitObserverAlert

CVE-2023-7235

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-7235. The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
#ExploitObserverAlert

CVE-2024-1212

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1212. Unauthenticated remote attackers can access the system through the LoadMaster management interface, enabling arbitrary system command execution.
#ExploitObserverAlert

EDB-51807

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to EDB-51807. WEBIGniter v28.7.23 - Stored Cross Site Scripting (XSS)
#ExploitObserverAlert

CVE-2024-25897

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-25897. ChurchCRM 5.5.0 FRCatalog.php is vulnerable to Blind SQL Injection (Time-based) via the CurrentFundraiser GET parameter.
#ExploitObserverAlert

CVE-2024-26311

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26311. Archer Platform 6.x before 6.14 P2 HF1 (6.14.0.2.1) contains a reflected XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this by tricking a victim application user into supplying malicious JavaScript code to the vulnerable web application. This code is then reflected to the victim and gets executed by the web browser in the context of the vulnerable web application.
#ExploitObserverAlert

CVE-2024-26582

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26582. In the Linux kernel, the following vulnerability has been resolved: net: tls: fix use-after-free with partial reads and async decrypt tls_decrypt_sg doesn't take a reference on the pages from clear_skb, so the put_page() in tls_decrypt_done releases them, and we trigger a use-after-free in process_rx_list when we try to read from the partially-read skb.
#ExploitObserverAlert

GHSA-54pv-r62j-9qqc

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-54pv-r62j-9qqc. Liferay Portal and Liferay DXP vulnerable to reflected Cross-site Scripting
#ExploitObserverAlert

CVE-2023-50955

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-50955. IBM InfoSphere Information Server 11.7 could allow an authenticated privileged user to obtain the absolute path of the web server installation which could aid in further attacks against the system. IBM X-Force ID: 275777.
#ExploitObserverAlert

CVE-2024-1703

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-1703. A vulnerability was found in ZhongBangKeJi CRMEB 5.2.2. It has been classified as problematic. This affects the function openfile of the file /adminapi/system/file/openfile. The manipulation leads to absolute path traversal. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-254391. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
#ExploitObserverAlert

GHSA-xpjg-7hx7-wgcx

DESCRIPTION: Exploit Observer has 3 entries in 3 file formats related to GHSA-xpjg-7hx7-wgcx. Liferay Portal and Liferay DXP vulnerable to Cross-site Scripting
#ExploitObserverAlert

CVE-2023-24333

DESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2023-24333. A stack overflow vulnerability in Tenda AC21 with firmware version US_AC21V1.0re_V16.03.08.15_cn_TDC01 allows attackers to run arbitrary commands via crafted POST request to /goform/openSchedWifi.